Web Application Security

Protect web applications across any cloud-native architecture, public or private.
Web Application Security Front
Web Application Security Back

Web applications present the highest security risk to business. Legacy web application firewalls (WAFs) can no longer provide sufficient security for modern cloud-native applications.

See our benchmark analysis on web application and API security.

Secure Your Web Applications

Prisma Cloud is the industry’s first cloud-native application protection platform to provide an integrated approach to web application security. Strengthening web application protection and addressing OWASP Top 10 risks, it offers a comprehensive suite of features — including vulnerability, compliance management and real-time protection. Prisma Cloud automatically detects and protects microservices-based web applications, whether hosted in cloud or on-premises environments.
  • Seamless visibility and comprehensive protection
  • Inline and out-of-band deployment
  • Full lifecycle protection at scale
  • OWASP Top 10 protection
    OWASP Top 10 protection
  • Virtual patching
    Virtual patching
  • Continuous visibility
    Continuous visibility
  • API security
    API security
  • Bot risk management
    Bot risk management
  • DoS protection
    DoS protection
  • Access control
    Access control

THE PRISMA CLOUD SOLUTION

Our Approach to Web Application Security

OWASP Top 10 Protection

Deploying web application firewalls can be difficult in mixed environments. Prisma Cloud simplifies deployments with agent-based and agentless deployment options for all cloud-native applications, delivering full, customizable support for the OWASP Top 10.

  • Secure web applications from top security risks

    Cover SQL injection, cross-site scripting, code injection and other attacks targeting OWASP Top 10 risks.

  • Enforce application security on microservices locally

    Implement a positive security model at the service level to keep up with auto scaling, ephemeral environments.

  • Leverage full, customizable protection

    Select which enforcement mechanism — alert, prevent or ban — to apply to each security scenario.

  • Deploy agents as a part of your DevOps workflow

    Use code-based deployment mechanisms to enable automatic deployment of protection with every code push.

  • Out-of-band

    Utilize full application -layer visibility into APIs and detect and alert against application-layer attacks in near-real time — without applying any latency or risk to the application.

  • Scalable protection

    As your application grows in your deployment, the number of defenders grows as well, tailoring protection to the application needs.

External Asset Discovery

Virtual Patching

With newly discovered vulnerabilities, exploit kits are often released before the patch. Protect against unpatched vulnerabilities at the service level.

  • Reduce risk until the software is patched

    Use virtual patching to create a safeguard against exploits until the underlying service can be patched.

  • Add custom WAAS rules for signatures from your team

    Take advantage of custom rules — a guided, autocomplete way to secure against exploits when your research teams identify vulnerabilities.

  • Protect against zero-day exploits

    Automatically receive updated WAAS rules from Prisma Cloud Labs and choose whether to apply them.

Virtual Patching

Continuous Visibility

Gaining visibility into protected and unprotected web applications is the first step toward comprehensive protection. That’s why Prisma Cloud automatically identifies the protection status of web apps to quickly enable customizable protection with a simple, straightforward UI.

  • Find and protect your entire web app surface

    Use Prisma Cloud to detect unprotected web applications and flag them for protection.

  • Leverage advanced analytics for investigations

    Use analytics to observe events in aggregate from different points of view. Filter them and dive into individual events for incident investigations.

  • View all security events in a single console

    Identify vulnerabilities, compliance violations, runtime events and application risk events in one product.

Continuous Visibility

API Security

The key to comprehensive protection is visibility, risk prioritization and real-time protection spanning the OWASP API Top 10 risks.

  • Auto discover APIs

    Automatically detect external, internal and third-party API services in your environment.

  • API risk profiling

    View all risk factors based on workload vulnerabilities, exploit data and application context.

  • Secure APIs against Layer 7 attacks

    Simplify enforcement of positive API definitions based on OpenAPI, Swagger file or manual customization.

  • Configure fully for each API endpoint

    Customize the level of alerting and blocking for the unique use cases of your applications.

  • Take a unified approach to cloud-native security

    Use a single, unified cloud security solution for superior protection.

Onboard Unmanaged Assets and Remediate Risk

Bot Risk Management

In an internet full of bots, not all bots are malicious. Gain visibility into bot activity to allow good bots like search engine crawlers to go through while malicious bots are blocked.

  • Allow and monitor known bots

    Allow good bots such as search engine crawlers and news bots to crawl your applications but monitor and block abusive behavior.

  • Control unknown bots

    Alert or block requests originating from bots with unknown intent, including headless browsers, command-line tools and good-bot impersonators.

  • Define custom bots

    Create bot definitions for bots your team designates as known-good or malicious.

  • Configurable for each application

    Set application-level or individual-service-level configurations for bot protection rules.

Bot Risk Management

Denial of Service Protection

DoS attacks have long been a favorite method for online extortionists and troublemakers. They can crash your applications, leading to a poor user experience.

  • Stop low-and-slow attacks

    Enforce a rate limit on IPs or sessions to protect against high-rate and low-and-slow application-layer DoS attacks.

  • Stop DoS attacks

    Ensure critical services are protected from misuse, abuse and DoS attacks.

Denial of Service Protection

Access Control

Protecting your application from unwanted access is a top priority for application security teams. WAAS allows for control over how applications and end users communicate with the protected web application.

  • Control inbound access to the application

    Network controls allow administrators to deny inbound access to the application as well as allowed IPs.

  • Block requests based on headers

    WAAS lets you block or allow requests that contain specific strings in HTTP headers.

  • Protect against malicious files

    Protect your applications against malware dropping by restricting uploads to just the files that match allowed content types.

Access Control
Prisma Cloud
Prisma Cloud
Prisma® Cloud is the most complete cloud-native application protection platform (CNAPP) in the industry, providing the broadest security and compliance coverage for infrastructure, workload and applications. This extensive protection spans the entire cloud-native technology stack, as well as the development lifecycle and multicloud and hybrid environments.

Prisma Cloud Related Modules

mobile thumbnail banner
thumbnail banner

API Security

Discover, profile and protect APIs across cloud-native applications.

mobile thumbnail banner
thumbnail banner

Web Application & API Security

Protect against Layer 7 and OWASP Top 10 threats in any public or private cloud.

Resources

Valuable Resources